SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Metody i sposoby bezpiecznego
 uwierzytelnienia w Windows 7

           Krzysztof Bińkowski
             Trener MCT Security/Forensics

                                28.04.2011
Agenda

•   o mnie słów kilka
•   Authentication = Uwierzytelnienie
•   Authentication / Authorization
•   Metody uwierzytelnienia 1FA/2FA/3FA
•   SmartCard Authentication
•   SmartCard + Biometric Authentication
•   Biometric Authentication
•   Face Authentication
•   Online Identity Integration
o mnie słów kilka


Posiadam kilka certyfikatów:           Na co dzień:


• MCT,                         • Trener technologii       • Społeczny notariusz CA
  MCSA/MCSE+Security,            Microsoft / security /     Cert / StartSSL
  MCITP SA/EA                    forensic s w firmie
• ACE (Accessdata Certified      COMPENDIUM Centrum       • Członek organizacji:
  Examiner)                      Edukacyjne
                                                          • ISSA Polska,
• ACI (Accessdata Certified                               • SIIS (Stowarzyszenie
  Instructor)                  • Specjalizacja: systemy     Instytut Informatyki
• Novell CNA/CNE                 Windows /                  Śledczej )
                                 Bezpieczeostwo / PKI /
                                                          • SEClub
                                 Forensics

                                                          • Współlider grupy MSSUG
                               • Specjalizuje się w
                                 informatyce śledczej
Uwierzytelnienie

• Authentication = Uwierzytelnienie


  Nie ma słowa „autentykacja” w
    słowniku języka polskiego

• Authorization = Autoryzacja
Authentication / Authorization?
                         Are you on the list?
Who are you?
Authentication: Czy      Authorization: Czy masz nadane
jesteś tym za kogo się   uprawnienia do zasobów do których
podajesz ?               próbujesz się dostać np. ACL




       User                                   Resource
                         What does the list say you can do?

                         Access: Na jakie działania pozwalają Ci
                         nadane uprawnienia.
Authentication and
                      Authorization Process
               Windows authentication methods include:


      Windows
                                               Description
Authentication Method

Kerberos version 5      Used by Windows 7 clients and servers running Microsoft
protocol                Windows Server 2000 or later
                        Used for backward compatibility with computers running
NTLM                    pre-Windows 2000 operating systems and some
                        applications

Certificate mapping     Certificates are used as authentication credentials
SECURE AUTHENTICATION



    What
    You
                      Biometrics    Convenient
    Are                             Two-Factor
                       Smart       Authentication    Most Secure
                       cards            2FA          Three-Factor
  What You
   Have               & Tokens       Traditional    Authentication
                                    Two-Factor           3FA
                                   Authentication
                      Passwords     2FA
                        & PINs
What You Know
New Authentication Features in Windows 7



 New Authentication
                                             Description
     Features
                      Several new authentication features are available for
                      use with Smart cards, including:
                      •Kerberos support for Smart card logon
Smart cards
                      •Encrypt removable media using BitLocker and using
                      the Smart card option to unlock the drive
                      •Document and e-mail signing
                      Windows Biometric Framework (WBF) provides support
Biometrics            for fingerprint biometric devices through a new set of
                      components
Online Identity       A new group policy setting is available that controls the
Integration           ability of online IDs to authenticate to a computer
Smart Card w języku polskim




      Karta inteligentna ?
      Karta elektroniczna ?
      Karta chipowa ?
      Karta kryptograficzna ?
      Karta mikroprocesorowa ?
Budowa Smart Card
- Posiada wbudowany procesor
- Jest programowalna
- Dostarcza bezpieczny magazyn dla kluczy prywatnych
- Oddziela krytyczne dla bezpieczeństwa operacje od
komputera


        Karta przechowuje:
          Klucz prywatny
          Klucz publiczny
        Powiązany certyfikat
Rodzaje kart
Karta, nie karta ?

• Czasem SMART CARD nazywamy
  tokenami USB
Czytniki kart
Smart Cards

             Smart card-related Plug and Play


           Kerberos support for Smart card logon

    Encrypt removable media using BitLocker and using the
            Smart card option to unlock the drive

               Document and e-mail signing

       Used with line-of-business applications to enable

         certificate use with no additional middleware
Gemalto .NET Bio
4 Tryby– 4 sposoby uwierzytelnienia
                                                                                Fingerprint Authentication


                                                                                     Biometric Verification
                                                                                  Please swipe your finger on the biometric reader.



                                                                                                         Biometric Authentication
                                                                                                       SWIPE FINGER

                                                                                                   Select Finger       Click here for more information

                                                                                                                                OK           Cance
                                                                                                                                               l

PIN or Fingerprint Authentication                                           PIN and Fingerprint Authentication


        Biometric Verification                                                       Biometric Verification
        Please swipe your finger OR enter your PIN                               Please swipe your finger first, then enter your PIN



                             Biometric Authentication                                                    Biometric Authentication
                           SWIPE FINGER                                                                SWIPE FINGER

                          PIN Authentication                                                           PIN Authentication

                                    PIN                                                                          PIN


                     Select Finger        Click here for more information                        Select Finger         Click here for more information


                                                  OK            Cance                                                           OK           Cance
                                                                  l                                                                            l
BIOMETRIC
Biometric

       Windows Biometric Framework (WBF) provides
     support for fingerprint biometric devices through a
                     new set of components
    A common API facilitates development of applications

                     using biometrics
    Through a new Control Panel item, users can control
       the availability and use of biometric devices

      Device Manager support for managing drivers for
                  biometric devices

   Group Policy settings to enable, disable, or limit the
    use of biometric data for a local computer or domain
Face Authentication
Online Identity Integration

     A new group policy setting is available that controls
   the ability of online IDs to authenticate to a computer

    Online IDs can be used to identify individuals within a

                         network
     Users must link their Windows user account to an
          online ID to facilitate authentication

   Authentication occurs through the use of certificates

      Does not affect domain accounts or local user
        accounts from logging on to the computer
Online Identity Integration

•   What's the benefit of linking my online IDs with my Windows user account?

•   If you have an online account, such as an e-mail account, you can link that
    account with your Windows user account. Linking these accounts provides
    the following benefits:
•   People can share files with you on a homegroup using your online ID
    instead of having to create a Windows user account for you on their
    computer.
•   You can use your online ID to access your information on other computers
    on a network, such as accessing files on a home computer from your work
    computer.

•   Linking your account is a two-part process. First, you need to add your
    online ID provider, and then you need to link your online ID with your
    Windows user account.
Dziękuje za uwagę


http://securityforensics.wordpress.com/

Email:
Krzysztof.Binkowski@gmail.com

Weitere ähnliche Inhalte

Was ist angesagt?

Higgins Overview 2008 [Compatibility Mode]
Higgins Overview 2008 [Compatibility Mode]Higgins Overview 2008 [Compatibility Mode]
Higgins Overview 2008 [Compatibility Mode]
Markus Sabadello
 
The Belgian E Id Hacker Vs Developer
The Belgian E Id Hacker Vs DeveloperThe Belgian E Id Hacker Vs Developer
The Belgian E Id Hacker Vs Developer
beires
 
Smart Cards & Devices Forum 2012 - Mobile ID usnadňuje život jak uživatelům, ...
Smart Cards & Devices Forum 2012 - Mobile ID usnadňuje život jak uživatelům, ...Smart Cards & Devices Forum 2012 - Mobile ID usnadňuje život jak uživatelům, ...
Smart Cards & Devices Forum 2012 - Mobile ID usnadňuje život jak uživatelům, ...
OKsystem
 
Jips v07 no1_paper17
Jips v07 no1_paper17Jips v07 no1_paper17
Jips v07 no1_paper17
Hai Nguyen
 
Inspira Biomorf Profile
Inspira Biomorf ProfileInspira Biomorf Profile
Inspira Biomorf Profile
uknadh
 
28032012 Irma vander Ploeg: e portfolio als digitale identiteit
28032012 Irma vander Ploeg: e portfolio als digitale identiteit28032012 Irma vander Ploeg: e portfolio als digitale identiteit
28032012 Irma vander Ploeg: e portfolio als digitale identiteit
Stichting ePortfolio Support
 
Brokerage 2007 presentation security
Brokerage 2007 presentation securityBrokerage 2007 presentation security
Brokerage 2007 presentation security
imec.archive
 

Was ist angesagt? (17)

Autdsi gvi
Autdsi gviAutdsi gvi
Autdsi gvi
 
Sms passcode
Sms passcodeSms passcode
Sms passcode
 
Ow2 aspire - RFID - fossa2010
Ow2 aspire - RFID - fossa2010Ow2 aspire - RFID - fossa2010
Ow2 aspire - RFID - fossa2010
 
Higgins Overview 2008 [Compatibility Mode]
Higgins Overview 2008 [Compatibility Mode]Higgins Overview 2008 [Compatibility Mode]
Higgins Overview 2008 [Compatibility Mode]
 
The Belgian E Id Hacker Vs Developer
The Belgian E Id Hacker Vs DeveloperThe Belgian E Id Hacker Vs Developer
The Belgian E Id Hacker Vs Developer
 
Smart Cards & Devices Forum 2012 - Mobile ID usnadňuje život jak uživatelům, ...
Smart Cards & Devices Forum 2012 - Mobile ID usnadňuje život jak uživatelům, ...Smart Cards & Devices Forum 2012 - Mobile ID usnadňuje život jak uživatelům, ...
Smart Cards & Devices Forum 2012 - Mobile ID usnadňuje život jak uživatelům, ...
 
Ecommerce Chap 08
Ecommerce Chap 08Ecommerce Chap 08
Ecommerce Chap 08
 
Dekartlogon en
Dekartlogon enDekartlogon en
Dekartlogon en
 
12251690 pss7
12251690 pss712251690 pss7
12251690 pss7
 
Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12
 
Jips v07 no1_paper17
Jips v07 no1_paper17Jips v07 no1_paper17
Jips v07 no1_paper17
 
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
 
Inspira Biomorf Profile
Inspira Biomorf ProfileInspira Biomorf Profile
Inspira Biomorf Profile
 
New Trends in Web Security
New Trends in Web SecurityNew Trends in Web Security
New Trends in Web Security
 
28032012 Irma vander Ploeg: e portfolio als digitale identiteit
28032012 Irma vander Ploeg: e portfolio als digitale identiteit28032012 Irma vander Ploeg: e portfolio als digitale identiteit
28032012 Irma vander Ploeg: e portfolio als digitale identiteit
 
Brokerage 2007 presentation security
Brokerage 2007 presentation securityBrokerage 2007 presentation security
Brokerage 2007 presentation security
 
SMARTGUARD SYSTEMS
SMARTGUARD SYSTEMSSMARTGUARD SYSTEMS
SMARTGUARD SYSTEMS
 

Ähnlich wie K binkowski metody_uwierzytelnienia_windows_7

Stronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsStronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise Applications
Ramesh Nagappan
 
Jips v07 no1_paper17_2
Jips v07 no1_paper17_2Jips v07 no1_paper17_2
Jips v07 no1_paper17_2
Hai Nguyen
 
Jips v07 no1_paper17_3
Jips v07 no1_paper17_3Jips v07 no1_paper17_3
Jips v07 no1_paper17_3
Hai Nguyen
 
Overall cryptography and pki introduction
Overall cryptography and pki introductionOverall cryptography and pki introduction
Overall cryptography and pki introduction
Avirot Mitamura
 
Why and how to implement strong authentication on the web cartes 2010 - pat...
Why and how to implement strong authentication on the web   cartes 2010 - pat...Why and how to implement strong authentication on the web   cartes 2010 - pat...
Why and how to implement strong authentication on the web cartes 2010 - pat...
Keynectis
 
13 biometrics - fool proof security
13 biometrics  - fool proof security13 biometrics  - fool proof security
13 biometrics - fool proof security
Srikanth457
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
Sheetal Verma
 
Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)
Ali Raw
 
Managing PIV Card Lifecycle and Converging Physical & Logical Access Control
Managing PIV Card Lifecycle and Converging Physical & Logical Access ControlManaging PIV Card Lifecycle and Converging Physical & Logical Access Control
Managing PIV Card Lifecycle and Converging Physical & Logical Access Control
Ramesh Nagappan
 
Trust elevation-share
Trust elevation-shareTrust elevation-share
Trust elevation-share
Abbie Barbir
 

Ähnlich wie K binkowski metody_uwierzytelnienia_windows_7 (20)

Biometric Authentication - A Key to Fortifying Digital Security.pptx
Biometric Authentication - A Key to Fortifying Digital Security.pptxBiometric Authentication - A Key to Fortifying Digital Security.pptx
Biometric Authentication - A Key to Fortifying Digital Security.pptx
 
User Authentication for Government
User Authentication for GovernmentUser Authentication for Government
User Authentication for Government
 
Stronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsStronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise Applications
 
Jips v07 no1_paper17_2
Jips v07 no1_paper17_2Jips v07 no1_paper17_2
Jips v07 no1_paper17_2
 
Jips v07 no1_paper17_3
Jips v07 no1_paper17_3Jips v07 no1_paper17_3
Jips v07 no1_paper17_3
 
AUTENTICACIÓN DE USUARIO, DEL OTP A LA BIOMETRÍA
AUTENTICACIÓN DE USUARIO, DEL OTP A LA BIOMETRÍAAUTENTICACIÓN DE USUARIO, DEL OTP A LA BIOMETRÍA
AUTENTICACIÓN DE USUARIO, DEL OTP A LA BIOMETRÍA
 
Overall cryptography and pki introduction
Overall cryptography and pki introductionOverall cryptography and pki introduction
Overall cryptography and pki introduction
 
Why and how to implement strong authentication on the web cartes 2010 - pat...
Why and how to implement strong authentication on the web   cartes 2010 - pat...Why and how to implement strong authentication on the web   cartes 2010 - pat...
Why and how to implement strong authentication on the web cartes 2010 - pat...
 
13 biometrics - fool proof security
13 biometrics  - fool proof security13 biometrics  - fool proof security
13 biometrics - fool proof security
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 
Biometrics
BiometricsBiometrics
Biometrics
 
E collaborationscottrea
E collaborationscottreaE collaborationscottrea
E collaborationscottrea
 
Authentication Simple as a Selfie - How Biometrics are Reducing Customer Fric...
Authentication Simple as a Selfie - How Biometrics are Reducing Customer Fric...Authentication Simple as a Selfie - How Biometrics are Reducing Customer Fric...
Authentication Simple as a Selfie - How Biometrics are Reducing Customer Fric...
 
Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)
 
Live ensure overview 1.4
Live ensure overview 1.4Live ensure overview 1.4
Live ensure overview 1.4
 
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
 
Digital trust - Building trust in this digital world
Digital trust - Building trust in this digital worldDigital trust - Building trust in this digital world
Digital trust - Building trust in this digital world
 
Managing PIV Card Lifecycle and Converging Physical & Logical Access Control
Managing PIV Card Lifecycle and Converging Physical & Logical Access ControlManaging PIV Card Lifecycle and Converging Physical & Logical Access Control
Managing PIV Card Lifecycle and Converging Physical & Logical Access Control
 
Trust elevation-share
Trust elevation-shareTrust elevation-share
Trust elevation-share
 
US Security for Cyber Security
US Security for Cyber SecurityUS Security for Cyber Security
US Security for Cyber Security
 

Mehr von Krzysztof Binkowski

WCL2013 - BitLocker w Twoim Windows 8 i w Twoim przedsiebiorstwie w oparciu o...
WCL2013 - BitLocker w Twoim Windows 8 i w Twoim przedsiebiorstwie w oparciu o...WCL2013 - BitLocker w Twoim Windows 8 i w Twoim przedsiebiorstwie w oparciu o...
WCL2013 - BitLocker w Twoim Windows 8 i w Twoim przedsiebiorstwie w oparciu o...
Krzysztof Binkowski
 
Mts2009 krzysztof binkowski - metody pozyskiwania i zabezpieczania danych w...
Mts2009   krzysztof binkowski - metody pozyskiwania i zabezpieczania danych w...Mts2009   krzysztof binkowski - metody pozyskiwania i zabezpieczania danych w...
Mts2009 krzysztof binkowski - metody pozyskiwania i zabezpieczania danych w...
Krzysztof Binkowski
 
Mts2009 krzysztof binkowski - praktyczne spojrzenie na zastosowanie smartca...
Mts2009   krzysztof binkowski - praktyczne spojrzenie na zastosowanie smartca...Mts2009   krzysztof binkowski - praktyczne spojrzenie na zastosowanie smartca...
Mts2009 krzysztof binkowski - praktyczne spojrzenie na zastosowanie smartca...
Krzysztof Binkowski
 

Mehr von Krzysztof Binkowski (15)

Sql z perspektywy hakera czy twoje dane są bezpieczne ? - Sqlday 2016 Wrocław
Sql z perspektywy hakera   czy twoje dane są bezpieczne ? - Sqlday 2016 WrocławSql z perspektywy hakera   czy twoje dane są bezpieczne ? - Sqlday 2016 Wrocław
Sql z perspektywy hakera czy twoje dane są bezpieczne ? - Sqlday 2016 Wrocław
 
I tech day_kbinkowski_bitlocker_lab_windows_to_go
I tech day_kbinkowski_bitlocker_lab_windows_to_goI tech day_kbinkowski_bitlocker_lab_windows_to_go
I tech day_kbinkowski_bitlocker_lab_windows_to_go
 
I tech day_kbinkowski_bitlocker_windows_to_go
I tech day_kbinkowski_bitlocker_windows_to_goI tech day_kbinkowski_bitlocker_windows_to_go
I tech day_kbinkowski_bitlocker_windows_to_go
 
eMail Forensic at PEPUG 58 - Microsoft Polska - Krzysztof Binkowski
eMail Forensic at PEPUG 58 - Microsoft Polska - Krzysztof Binkowski eMail Forensic at PEPUG 58 - Microsoft Polska - Krzysztof Binkowski
eMail Forensic at PEPUG 58 - Microsoft Polska - Krzysztof Binkowski
 
Mgr k.binkowski computer_forensics_raport
Mgr k.binkowski computer_forensics_raportMgr k.binkowski computer_forensics_raport
Mgr k.binkowski computer_forensics_raport
 
Mgr k.binANALIZA POWŁAMANIOWA W SYSTEMACH MICROSOFT WINDOWS - Krzysztof Binko...
Mgr k.binANALIZA POWŁAMANIOWA W SYSTEMACH MICROSOFT WINDOWS - Krzysztof Binko...Mgr k.binANALIZA POWŁAMANIOWA W SYSTEMACH MICROSOFT WINDOWS - Krzysztof Binko...
Mgr k.binANALIZA POWŁAMANIOWA W SYSTEMACH MICROSOFT WINDOWS - Krzysztof Binko...
 
Certyfikaty od podszewki w oparciu o PKI w windows 2008 MTS 2011
Certyfikaty od podszewki w oparciu o PKI w windows 2008 MTS 2011Certyfikaty od podszewki w oparciu o PKI w windows 2008 MTS 2011
Certyfikaty od podszewki w oparciu o PKI w windows 2008 MTS 2011
 
BitLocker TO GO - szybki start - WGUISW SNACK
BitLocker TO GO - szybki start - WGUISW SNACKBitLocker TO GO - szybki start - WGUISW SNACK
BitLocker TO GO - szybki start - WGUISW SNACK
 
Co w Facebook’u piszczy, czyli media społecznościowe z perspektywy informatyk...
Co w Facebook’u piszczy, czyli media społecznościowe z perspektywy informatyk...Co w Facebook’u piszczy, czyli media społecznościowe z perspektywy informatyk...
Co w Facebook’u piszczy, czyli media społecznościowe z perspektywy informatyk...
 
Threat Management Gateway 2010 - Forefront Community launch 2010
Threat Management Gateway 2010- Forefront Community launch 2010Threat Management Gateway 2010- Forefront Community launch 2010
Threat Management Gateway 2010 - Forefront Community launch 2010
 
WCL2013 - BitLocker w Twoim Windows 8 i w Twoim przedsiebiorstwie w oparciu o...
WCL2013 - BitLocker w Twoim Windows 8 i w Twoim przedsiebiorstwie w oparciu o...WCL2013 - BitLocker w Twoim Windows 8 i w Twoim przedsiebiorstwie w oparciu o...
WCL2013 - BitLocker w Twoim Windows 8 i w Twoim przedsiebiorstwie w oparciu o...
 
Podążając śladami użytkownika Windows – elementy informatyki śledczej
Podążając śladami użytkownika Windows –elementy informatyki śledczejPodążając śladami użytkownika Windows –elementy informatyki śledczej
Podążając śladami użytkownika Windows – elementy informatyki śledczej
 
Podpis cyfrowy office2010
Podpis cyfrowy office2010Podpis cyfrowy office2010
Podpis cyfrowy office2010
 
Mts2009 krzysztof binkowski - metody pozyskiwania i zabezpieczania danych w...
Mts2009   krzysztof binkowski - metody pozyskiwania i zabezpieczania danych w...Mts2009   krzysztof binkowski - metody pozyskiwania i zabezpieczania danych w...
Mts2009 krzysztof binkowski - metody pozyskiwania i zabezpieczania danych w...
 
Mts2009 krzysztof binkowski - praktyczne spojrzenie na zastosowanie smartca...
Mts2009   krzysztof binkowski - praktyczne spojrzenie na zastosowanie smartca...Mts2009   krzysztof binkowski - praktyczne spojrzenie na zastosowanie smartca...
Mts2009 krzysztof binkowski - praktyczne spojrzenie na zastosowanie smartca...
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

K binkowski metody_uwierzytelnienia_windows_7

  • 1. Metody i sposoby bezpiecznego uwierzytelnienia w Windows 7 Krzysztof Bińkowski Trener MCT Security/Forensics 28.04.2011
  • 2. Agenda • o mnie słów kilka • Authentication = Uwierzytelnienie • Authentication / Authorization • Metody uwierzytelnienia 1FA/2FA/3FA • SmartCard Authentication • SmartCard + Biometric Authentication • Biometric Authentication • Face Authentication • Online Identity Integration
  • 3. o mnie słów kilka Posiadam kilka certyfikatów: Na co dzień: • MCT, • Trener technologii • Społeczny notariusz CA MCSA/MCSE+Security, Microsoft / security / Cert / StartSSL MCITP SA/EA forensic s w firmie • ACE (Accessdata Certified COMPENDIUM Centrum • Członek organizacji: Examiner) Edukacyjne • ISSA Polska, • ACI (Accessdata Certified • SIIS (Stowarzyszenie Instructor) • Specjalizacja: systemy Instytut Informatyki • Novell CNA/CNE Windows / Śledczej ) Bezpieczeostwo / PKI / • SEClub Forensics • Współlider grupy MSSUG • Specjalizuje się w informatyce śledczej
  • 4. Uwierzytelnienie • Authentication = Uwierzytelnienie Nie ma słowa „autentykacja” w słowniku języka polskiego • Authorization = Autoryzacja
  • 5. Authentication / Authorization? Are you on the list? Who are you? Authentication: Czy Authorization: Czy masz nadane jesteś tym za kogo się uprawnienia do zasobów do których podajesz ? próbujesz się dostać np. ACL User Resource What does the list say you can do? Access: Na jakie działania pozwalają Ci nadane uprawnienia.
  • 6. Authentication and Authorization Process Windows authentication methods include: Windows Description Authentication Method Kerberos version 5 Used by Windows 7 clients and servers running Microsoft protocol Windows Server 2000 or later Used for backward compatibility with computers running NTLM pre-Windows 2000 operating systems and some applications Certificate mapping Certificates are used as authentication credentials
  • 7. SECURE AUTHENTICATION What You Biometrics Convenient Are Two-Factor Smart Authentication Most Secure cards 2FA Three-Factor What You Have & Tokens Traditional Authentication Two-Factor 3FA Authentication Passwords 2FA & PINs What You Know
  • 8. New Authentication Features in Windows 7 New Authentication Description Features Several new authentication features are available for use with Smart cards, including: •Kerberos support for Smart card logon Smart cards •Encrypt removable media using BitLocker and using the Smart card option to unlock the drive •Document and e-mail signing Windows Biometric Framework (WBF) provides support Biometrics for fingerprint biometric devices through a new set of components Online Identity A new group policy setting is available that controls the Integration ability of online IDs to authenticate to a computer
  • 9. Smart Card w języku polskim  Karta inteligentna ?  Karta elektroniczna ?  Karta chipowa ?  Karta kryptograficzna ?  Karta mikroprocesorowa ?
  • 10. Budowa Smart Card - Posiada wbudowany procesor - Jest programowalna - Dostarcza bezpieczny magazyn dla kluczy prywatnych - Oddziela krytyczne dla bezpieczeństwa operacje od komputera Karta przechowuje: Klucz prywatny Klucz publiczny Powiązany certyfikat
  • 12. Karta, nie karta ? • Czasem SMART CARD nazywamy tokenami USB
  • 14. Smart Cards  Smart card-related Plug and Play  Kerberos support for Smart card logon Encrypt removable media using BitLocker and using the  Smart card option to unlock the drive  Document and e-mail signing Used with line-of-business applications to enable  certificate use with no additional middleware
  • 15.
  • 17. 4 Tryby– 4 sposoby uwierzytelnienia Fingerprint Authentication Biometric Verification Please swipe your finger on the biometric reader. Biometric Authentication SWIPE FINGER Select Finger Click here for more information OK Cance l PIN or Fingerprint Authentication PIN and Fingerprint Authentication Biometric Verification Biometric Verification Please swipe your finger OR enter your PIN Please swipe your finger first, then enter your PIN Biometric Authentication Biometric Authentication SWIPE FINGER SWIPE FINGER PIN Authentication PIN Authentication PIN PIN Select Finger Click here for more information Select Finger Click here for more information OK Cance OK Cance l l
  • 19. Biometric Windows Biometric Framework (WBF) provides  support for fingerprint biometric devices through a new set of components A common API facilitates development of applications  using biometrics Through a new Control Panel item, users can control  the availability and use of biometric devices Device Manager support for managing drivers for  biometric devices  Group Policy settings to enable, disable, or limit the use of biometric data for a local computer or domain
  • 20.
  • 22.
  • 23. Online Identity Integration A new group policy setting is available that controls  the ability of online IDs to authenticate to a computer Online IDs can be used to identify individuals within a  network Users must link their Windows user account to an  online ID to facilitate authentication  Authentication occurs through the use of certificates  Does not affect domain accounts or local user accounts from logging on to the computer
  • 24. Online Identity Integration • What's the benefit of linking my online IDs with my Windows user account? • If you have an online account, such as an e-mail account, you can link that account with your Windows user account. Linking these accounts provides the following benefits: • People can share files with you on a homegroup using your online ID instead of having to create a Windows user account for you on their computer. • You can use your online ID to access your information on other computers on a network, such as accessing files on a home computer from your work computer. • Linking your account is a two-part process. First, you need to add your online ID provider, and then you need to link your online ID with your Windows user account.